{"id":709,"date":"2018-09-02T10:08:03","date_gmt":"2018-09-02T02:08:03","guid":{"rendered":"http:\/\/ehluar.com\/main\/?p=709"},"modified":"2018-09-06T10:23:54","modified_gmt":"2018-09-06T02:23:54","slug":"the-cybersecurity-act-2018","status":"publish","type":"post","link":"http:\/\/ehluar.com\/main\/2018\/09\/02\/the-cybersecurity-act-2018\/","title":{"rendered":"The Cybersecurity Act 2018"},"content":{"rendered":"<p class=\"hP\">On 31 August 2018, the Cybersecurity Act 2018 has came into operation of Parts 1 to 4, 6 and the First Schedule.<\/p>\n<p class=\"hP\">This Act was passed by Parliament on 5 February 2018 and assented to by the President on 2 March 2018. It establishes a framework for the protection of critical information infrastructure (CII) against cybersecurity threats, the taken measures to prevent, manage and respond to cybersecurity threats and incidents in Singapore.<\/p>\n<p>Part 1 introduces the fundamental concepts used in the Act and provides for the application of the Act.<\/p>\n<p>Part 2 provides for the administration of the Act and the appointment of a Commissioner of Cybersecurity (Commissioner) and other officers for the purposes of the Act.<\/p>\n<p>Part 3 provides for the designation of CII and the regulation of owners of CII with regard to the cybersecurity of the CII.<\/p>\n<p>Part 4 provides for the taking of measures to prevent, manage and respond to cybersecurity threats and incidents in Singapore.<\/p>\n<p>Part 5 provides for the licensing of providers of licensable cybersecurity services.<\/p>\n<p>Part 6 contains general provisions.<\/p>\n<p class=\"hP\">The\u00a0 Cybersecurity Act 2018 (Commencement) Notification 2018 has been gazetted on 30 August 2018.<\/p>\n<p class=\"hP\"><i>Source: CSA Singapore, 2 September<\/i> 2018<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On 31 August 2018, the Cybersecurity Act 2018 has came into operation of Parts 1 to 4, 6 and the First Schedule. This Act was passed by Parliament on 5 February 2018 and assented to by the President on 2 March 2018. It establishes a framework for the protection of critical information infrastructure (CII) against [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[12,6],"tags":[],"class_list":["post-709","post","type-post","status-publish","format-standard","hentry","category-company-law","category-techupdates"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"http:\/\/ehluar.com\/main\/wp-json\/wp\/v2\/posts\/709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ehluar.com\/main\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ehluar.com\/main\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ehluar.com\/main\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/ehluar.com\/main\/wp-json\/wp\/v2\/comments?post=709"}],"version-history":[{"count":1,"href":"http:\/\/ehluar.com\/main\/wp-json\/wp\/v2\/posts\/709\/revisions"}],"predecessor-version":[{"id":710,"href":"http:\/\/ehluar.com\/main\/wp-json\/wp\/v2\/posts\/709\/revisions\/710"}],"wp:attachment":[{"href":"http:\/\/ehluar.com\/main\/wp-json\/wp\/v2\/media?parent=709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ehluar.com\/main\/wp-json\/wp\/v2\/categories?post=709"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ehluar.com\/main\/wp-json\/wp\/v2\/tags?post=709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}